Ravens PHP Scripts

Advanced Login *root* File Inclusion Vulnerability
Date: Friday, March 30, 2007 @ 11:10:28 PDT
Topic: Security


SECUNIA ADVISORY ID: SA24695

VERIFY ADVISORY: http://secunia.com/advisories/24695/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Advanced Login 0.x - http://secunia.com/product/13824/

DESCRIPTION: Zeni Susanto has discovered a vulnerability in Advanced Login, which can be exploited by malicious people to compromise a vulnerable system.




Input passed to the "root" parameter in engine/db/profiledit.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 0.76. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified. Fixed in version 0.9 Public Beta 2.

PROVIDED AND/OR DISCOVERED BY: Zeni Susanto a.k.a. Bithedz

ORIGINAL ADVISORY: http://milw0rm.com/exploits/3608






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2840